CVE-2002-0864
Published Oct 11, 2002
Last updated 6 years ago
Overview
- Description
- The Remote Data Protocol (RDP) version 5.1 in Microsoft Windows XP allows remote attackers to cause a denial of service (crash) when Remote Desktop is enabled via a PDU Confirm Active data packet that does not set the Pattern BLT command, aka "Denial of Service in Remote Desktop."
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:.net_windows_server:beta3:*:standard:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "35C20809-70F9-4AB9-A395-FE409A0FAF66" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD" }, { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "294EBA01-147B-4DA0-937E-ACBB655EDE53" }, { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E8B7346-F2AA-434C-A048-7463EC1BB117" }, { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BE1A6107-DE00-4A1C-87FC-9E4015165B5B" }, { "criteria": "cpe:2.3:o:microsoft:windows_2000_terminal_services:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9D34EFE5-22B7-4E8D-B5B2-2423C37CFFA7" }, { "criteria": "cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8208AFC9-0EFC-4A90-AD5A-FD94F5542885" }, { "criteria": "cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D4168AE-D19E-482E-8F2B-3E798B2D84E7" }, { "criteria": "cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B5E149E7-B748-44F6-BB55-68D5BF87AF41" }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "91D6D065-A28D-49DA-B7F4-38421FF86498" }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BC176BB0-1655-4BEA-A841-C4158167CC9B" }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4BF263CB-4239-4DB0-867C-9069ED02CAD7" }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B3BBBB2E-1699-4E1E-81BB-7A394DD6B31D" }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49693FA0-BF34-438B-AFF2-75ACC8A6D2E6" } ], "operator": "OR" } ] } ]